Dear Dr. Yusri.
Welcome to Our blog.
We are "Twinkle "group from 2BTMM.
Our blog is all about the MIS Case study!
Enjoy reading!
ENTER

Tuesday 3 December 2013

Information security threat and policies in Europe.

1.      



     What is botnet?
Botnet is a network of private computer infected with malicious software and control as a group without the       owner’s knowledge.For example,to send spam, virus,attack computers and server and to commit other kind of crime and fraud.

2.    Describe some of the main point of the Digital Agenda for Europe.
The main objective of Digital Agenda for Europe is develop a digital single market in order to generate smart,sustainable and inclusive growth in Europe.
Actions are to taken under Digital Agenda
-Telecommunication services should be unified.Numbering of services and spectrum bands should be harmonized.
-Enhance the interoperability of devices,applications,data respositories,services and networks.Continue the review of standard setting policy should be done and promote appropriate rules for intellectual property rights.
-Strengthen its policy to combat cybercrime,child pornography and breaches of privacy and personal data security to against cyber attack.
Next,provide competitively priced fast and ultra fast internet access for all.Use European fund in order to finance investment in broadband.

3.    Explain how a cyber attack can be carry out?
Cyber attacks are socially or politically motivated attacks carried out primary through the internet.Attack target the general public or national and corporate organization are carried out though the spread of malicious program which are viruses,unauthorized web access,fake wedsite and other means of stealing personal or institutional information from targets of attacks,causing far-reading damage.
            The attack was performed using a variety of techniques,ranging from simple individual ping commands and message floading to move sophisticated distributed denial of service (DDOS) attacks.Hackers coordinated the attack by using a large number of compromised servers organized in a botnet distributed around the world.Once a computer is infected it becomes part of a network of thousands of ‘zombie’ machine that are commanded to carry out the attack.

4.   Describe some of the exploited by malware
First,malware exploits weak points or vulnerabilities,in widely used technologies.The myriad rapidly developing applications that made up the web provide a wealth of vulnerabilities for online criminal to exploit.
            The malware found on a malicious website-such as one involved in an iFrame  attack-begins a series of probes ,looking for unpatched weakness in browser,the myriad browser plug-ins you might have installed,your operating system or application that running.
            When a useful vulnerability is found,malware attack is to create a buffer overflow condition in computer then it gives malware the capability to download of harmful code-the keyloggers,botnet software,spyware and generaters or other malware.
            Besides,malware creatures and distributors also take advantage of weaknesses in human nature,such as curiousity,trust,desire for connection and carelessness to dupe users into handling over keys to their system security.


No comments:

Post a Comment